dblp.uni-trier.dewww.uni-trier.de

Cheng Xu

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
20EEYan Liu, Renfa Li, Cheng Xu, Fei Yu: HW-SW Framework for Multimedia Applications on MPSoC: Practice and Experience. JCP 4(3): 238-244 (2009)
2008
19EEKen Chen, Fei Yu, Cheng Xu, Yan Liu: Intrusion Detection for High-Speed Networks Based on Producing System. WKDD 2008: 532-537
18EEYan Liu, Renfa Li, Cheng Xu, Fei Yu: Design and Implementation of Embedded Multimedia Surveillance System. WKDD 2008: 570-573
2007
17EEJi-yao An, Ronghui Wu, Renfa Li, Cheng Xu: An Intrusion Alarm System Based on Fuzzy Reasoning Machine. IITA 2007: 165-168
16EEKen Chen, Cheng Xu, Fei Yu: The Implementation of Evidence Theory in Mobile E-Business Payment. IITA 2007: 214-217
15EEWeifeng Du, Guangxue Yue, Cheng Xu: A Brief Analysis about Boundary Region Partition Reduction Standard. IITA 2007: 34-37
14 Lei Ding, Fei Yu, Guangxue Yue, Cheng Xu: An Improved Algorithm of Pattern Matching for Information Security Audit System. IMECS 2007: 459-463
13 Ronghui Wu, Yiming Liang, Renfa Li, Cheng Xu, Fei Yu: Distributed Denial of Service Attacks Alarm Modeling Based on Wireless Local Area Network. IMECS 2007: 650-653
12EEFei Yu, Yue Shen, Guangxue Yue, Ronghui Wu, Cheng Xu: Catastrophe Prediction of Cnaphalocrosis Medinalis Based on Fuzzy Reasoning. International Conference on Computational Science (3) 2007: 109-112
11EERonghui Wu, Renfa Li, Fei Yu, Guangxue Yue, Cheng Xu: Research on Advanced Distributed Learning by Using SCORM. International Conference on Computational Science (3) 2007: 571-574
10EELiu Xianhua, Zhang Jiyu, Cheng Xu: Efficient code size reduction without performance loss. SAC 2007: 666-672
2006
9EEFei Yu, Yue Shen, Huang Huang, Cheng Xu, Xia-peng Dai: An Information Audit System Based on Bayes Algorithm. APWeb Workshops 2006: 869-876
8EELiu Feng, Guo Rui, Shi Shu, Cheng Xu: HW/SW Co-Design and Implementation of Multi-Standard Video Decoding. ESTImedia 2006: 87-92
7EEGang Wang, Cheng Xu, Ying Li, Ying Chen: Analyzing XML Parser Memory Characteristics: Experiments towards ImprovingWeb Services Performance. ICWS 2006: 681-688
6EECheng Xu, Fei Yu, Zhenghui Dai, Guangxue Yue, Renfa Li: Data Distribution Algorithm of High-Speed Intrusion Detection system Based on Network Processor. SKG 2006: 27
5EERonghui Wu, Renfa Li, Fei Yu, Guangxue Yue, Cheng Xu: Research on User Authentication for Grid Computing Security. SKG 2006: 72
2005
4EEEric Li, Cheng Xu, Tao Wang, Li Jin, Yimin Zhang: Parallel Linear Space Algorithm for Large-Scale Sequence Alignment. Euro-Par 2005: 1207-1216
3EEFei Yu, Huang Huang, Cheng Xu, Xiao-peng Dai, Miaoliang Zhu: Badness Information Audit Based on Image Character Filtering. ISPA Workshops 2005: 647-656
2004
2EEBin Wang, Zhuoqun Xu, Cheng Xu, Yanbin Yin, Wenkui Ding, Huashan Yu: A Study of Gridifying Scientific Computing Legacy Codes. GCC 2004: 404-412
1EEZude Zhou, Cheng Xu, ChunQing Ling, Renfa Li: An optimization design and simulation of Ptolemy-based motor speed control. ICARCV 2004: 847-850

Coauthor Index

1Ji-yao An [17]
2Ken Chen [16] [19]
3Ying Chen [7]
4Xia-peng Dai [9]
5Xiao-peng Dai [3]
6Zhenghui Dai [6]
7Lei Ding [14]
8Wenkui Ding [2]
9Weifeng Du [15]
10Liu Feng [8]
11Huang Huang [3] [9]
12Li Jin [4]
13Zhang Jiyu [10]
14Eric Li [4]
15Renfa Li [1] [5] [6] [11] [13] [17] [18] [20]
16Ying Li [7]
17Yiming Liang [13]
18ChunQing Ling [1]
19Yan Liu (Yan (Jenny) Liu) [18] [19] [20]
20Guo Rui [8]
21Yue Shen [9] [12]
22Shi Shu [8]
23Bin Wang [2]
24Gang Wang [7]
25Tao Wang [4]
26Ronghui Wu [5] [11] [12] [13] [17]
27Liu Xianhua [10]
28Zhuoqun Xu [2]
29Yanbin Yin [2]
30Fei Yu [3] [5] [6] [9] [11] [12] [13] [14] [16] [18] [19] [20]
31Huashan Yu [2]
32Guangxue Yue [5] [6] [11] [12] [14] [15]
33Yimin Zhang [4]
34Zude Zhou [1]
35Miaoliang Zhu [3]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)